function testLockEtc() { mkdir(SABRE_TEMPDIR . '/mstest'); $tree = new Sabre_DAV_FS_Directory(SABRE_TEMPDIR . '/mstest'); $server = new Sabre_DAV_Server($tree); $server->debugExceptions = true; $locksBackend = new Sabre_DAV_Locks_Backend_File(SABRE_TEMPDIR . '/locksdb'); $locksPlugin = new Sabre_DAV_Locks_Plugin($locksBackend); $server->addPlugin($locksPlugin); $response1 = new Sabre_HTTP_ResponseMock(); $server->httpRequest = $this->getLockRequest(); $server->httpResponse = $response1; $server->exec(); $this->assertEquals('HTTP/1.1 201 Created', $server->httpResponse->status); $this->assertTrue(isset($server->httpResponse->headers['Lock-Token'])); $lockToken = $server->httpResponse->headers['Lock-Token']; //sleep(10); $response2 = new Sabre_HTTP_ResponseMock(); $server->httpRequest = $this->getLockRequest2(); $server->httpResponse = $response2; $server->exec(); $this->assertEquals('HTTP/1.1 201 Created', $server->httpResponse->status); $this->assertTrue(isset($server->httpResponse->headers['Lock-Token'])); //sleep(10); $response3 = new Sabre_HTTP_ResponseMock(); $server->httpRequest = $this->getPutRequest($lockToken); $server->httpResponse = $response3; $server->exec(); $this->assertEquals('HTTP/1.1 204 No Content', $server->httpResponse->status); }
/** * Makes a request, and returns a response object. * * You can either pass an isntance of Sabre_HTTP_Request, or an array, * which will then be used as the _SERVER array. * * @param array|Sabre_HTTP_Request $request * @return Sabre_HTTP_Response */ function request($request) { if (is_array($request)) { $request = new Sabre_HTTP_Request($request); } $this->server->httpRequest = $request; $this->server->httpResponse = new Sabre_HTTP_ResponseMock(); $this->server->exec(); return $this->server->httpResponse; }
public function handle() { try { Tinebase_Core::initFramework(); } catch (Zend_Session_Exception $exception) { if (Tinebase_Core::isLogLevel(Zend_Log::WARN)) { Tinebase_Core::getLogger()->warn(__METHOD__ . '::' . __LINE__ . ' invalid session. Delete session cookie.'); } Zend_Session::expireSessionCookie(); header('WWW-Authenticate: Basic realm="WebDAV for Tine 2.0"'); header('HTTP/1.1 401 Unauthorized'); return; } if (Tinebase_Core::isLogLevel(Zend_Log::INFO)) { Tinebase_Core::getLogger()->info(__METHOD__ . '::' . __LINE__ . ' is CalDav, CardDAV or WebDAV request.'); } if (empty($_SERVER['PHP_AUTH_USER']) && empty($_SERVER['REMOTE_USER']) && empty($_SERVER['REDIRECT_REMOTE_USER'])) { header('WWW-Authenticate: Basic realm="WebDav for Tine 2.0"'); header('HTTP/1.1 401 Unauthorized'); return; } // when used with (f)cgi no PHP_AUTH variables are available without defining a special rewrite rule if (!isset($_SERVER['PHP_AUTH_USER'])) { // $_SERVER["REMOTE_USER"] == "Basic didhfiefdhfu4fjfjdsa34drsdfterrde..." $basicAuthData = base64_decode(substr(isset($_SERVER["REMOTE_USER"]) ? $_SERVER["REMOTE_USER"] : $_SERVER['REDIRECT_REMOTE_USER'], 6)); list($_SERVER['PHP_AUTH_USER'], $_SERVER['PHP_AUTH_PW']) = explode(":", $basicAuthData); } if (Tinebase_Controller::getInstance()->login($_SERVER['PHP_AUTH_USER'], $_SERVER['PHP_AUTH_PW'], $_SERVER['REMOTE_ADDR'], 'TineWebDav') !== true) { header('WWW-Authenticate: Basic realm="CardDav for Tine 2.0"'); header('HTTP/1.1 401 Unauthorized'); return; } self::$_server = new Sabre_DAV_Server(new Tinebase_WebDav_Root()); // compute base uri $request = new Zend_Controller_Request_Http(); self::$_server->setBaseUri($request->getBaseUrl() . '/'); $tempDir = Tinebase_Core::getTempDir(); if (!empty($tempDir)) { $lockBackend = new Sabre_DAV_Locks_Backend_File($tempDir . '/webdav.lock'); $lockPlugin = new Sabre_DAV_Locks_Plugin($lockBackend); self::$_server->addPlugin($lockPlugin); } $authPlugin = new Sabre_DAV_Auth_Plugin(new Tinebase_WebDav_Auth(), null); self::$_server->addPlugin($authPlugin); $aclPlugin = new Sabre_DAVACL_Plugin(); $aclPlugin->defaultUsernamePath = 'principals/users'; $aclPlugin->principalCollectionSet = array($aclPlugin->defaultUsernamePath); self::$_server->addPlugin($aclPlugin); self::$_server->addPlugin(new Sabre_CardDAV_Plugin()); self::$_server->addPlugin(new Sabre_CalDAV_Plugin()); self::$_server->addPlugin(new Sabre_CalDAV_Schedule_Plugin()); self::$_server->addPlugin(new Sabre_DAV_Browser_Plugin()); self::$_server->exec(); }
public function process() { // initialize authentication $auth = new Sabre_HTTP_DigestAuth(); $auth->setRealm($this->app->config->site->auth_realm); $auth->init(); // authenticate and get correct user $email = $auth->getUsername(); $class_name = SwatDBClassMap::get('PinholeAdminUser'); $user = new $class_name(); $user->setDatabase($this->app->db); if (!$user->loadFromEmail($email) || !$auth->validateA1($user->digest_ha1)) { $auth->requireLogin(); echo Pinhole::_('Authentication required') . "\n"; exit; } // create directory for account and object tree for dav server $root = new PinholeDavDirectory($this->app, $user); $tree = new Sabre_DAV_ObjectTree($root); // create server $server = new Sabre_DAV_Server($tree); $server->setBaseUri($this->getDavBaseUri()); // don't save temp files in the database $tempFilePlugin = new Sabre_DAV_TemporaryFileFilterPlugin($this->getDataDir('dav/temp')); $server->addPlugin($tempFilePlugin); // set up lock plugin $lockBackend = new Sabre_DAV_Locks_Backend_FS($this->getDataDir('dav/locks')); $lockPlugin = new Sabre_DAV_Locks_Plugin($lockBackend); $server->addPlugin($lockPlugin); // also allow regular web browsing $browserPlugin = new Sabre_DAV_Browser_Plugin(false); $server->addPlugin($browserPlugin); // serve it up! $server->exec(); }
/** * Fire up the SabreDAV server with our custom backends. * * This is mostly copied from the sabredav wiki */ public function indexAction() { // Backends $authBackend = new WebDAV_Helper_Auth(); $principalBackend = new Phprojekt_CalDAV_PrincipalBackend(); $calendarBackend = new Calendar2_CalDAV_CalendarBackend(); // Directory tree $tree = array(new Sabre_DAVACL_PrincipalCollection($principalBackend), new Sabre_CalDAV_CalendarRootNode($principalBackend, $calendarBackend)); $server = new Sabre_DAV_Server($tree); $server->setBaseUri('/index.php/Calendar2/caldav/index'); // Authentication plugin $authPlugin = new Sabre_DAV_Auth_Plugin($authBackend, 'CalDAV'); $server->addPlugin($authPlugin); // CalDAV plugin $caldavPlugin = new Sabre_CalDAV_Plugin(); $server->addPlugin($caldavPlugin); // ACL plugin $aclPlugin = new Sabre_DAVACL_Plugin(); $server->addPlugin($aclPlugin); // Support for html frontend $browser = new Sabre_DAV_Browser_Plugin(); $server->addPlugin($browser); // And off we go! $server->exec(); }
public function indexAction() { // Set the root directory $webdavPath = Phprojekt::getInstance()->getConfig()->webdavPath; if (Phprojekt_Auth::isLoggedIn()) { $project = new Project_Models_Project(); $project = $project->find(1); $rootDirectory = new WebDAV_Models_ProjectDirectory($project); } else { // Some clients seem to send some queries without http auth. We need the dummy to serve those. $rootDirectory = new WebDAV_Models_EmptyDir(); } // The server object is responsible for making sense out of the WebDAV protocol $server = new Sabre_DAV_Server($rootDirectory); $server->setBaseUri($this->view->baseUrl('index.php/WebDAV/index/index/')); // The lock manager is reponsible for making sure users don't overwrite each others changes. // Change 'data' to a different directory, if you're storing your data somewhere else. $lockBackend = new Sabre_DAV_Locks_Backend_File($webdavPath . 'data/locks'); $lockPlugin = new Sabre_DAV_Locks_Plugin($lockBackend); $server->addPlugin($lockPlugin); // Authentication $authBackend = new WebDAV_Helper_Auth(); $authPlugin = new Sabre_DAV_Auth_Plugin($authBackend, 'WebDAV'); $server->addPlugin($authPlugin); // All we need to do now, is to fire up the server $server->exec(); }
/** * @depends testCalendarMultiGetReport */ function testCalendarMultiGetReportEndBeforeStart() { $body = '<?xml version="1.0"?>' . '<c:calendar-multiget xmlns:c="urn:ietf:params:xml:ns:caldav" xmlns:d="DAV:">' . '<d:prop>' . ' <c:calendar-data>' . ' <c:expand start="20200101T000000Z" end="20110101T000000Z" />' . ' </c:calendar-data>' . ' <d:getetag />' . '</d:prop>' . '<d:href>/calendars/user1/UUID-123467/UUID-2345</d:href>' . '</c:calendar-multiget>'; $request = new Sabre_HTTP_Request(array('REQUEST_METHOD' => 'REPORT', 'REQUEST_URI' => '/calendars/user1', 'HTTP_DEPTH' => '1')); $request->setBody($body); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 400 Bad request', $this->response->status, 'Invalid HTTP status received. Full response body: ' . $this->response->body); }
function testSimpleCopyCollection() { $serverVars = array('REQUEST_URI' => '/col', 'REQUEST_METHOD' => 'COPY', 'HTTP_DESTINATION' => '/col2'); $request = new Sabre_HTTP_Request($serverVars); $this->server->httpRequest = $request; $this->server->exec(); $this->assertEquals('HTTP/1.1 201 Created', $this->response->status, 'Incorrect status received. Full response body: ' . $this->response->body); $this->assertEquals(array('Content-Length' => '0'), $this->response->headers); $this->assertEquals('Test contents', file_get_contents(SABRE_TEMPDIR . '/col2/test.txt')); }
function testReportPassThrough() { $fakeServer = new Sabre_DAV_Server(new Sabre_DAV_ObjectTree(new Sabre_DAV_SimpleDirectory('bla'))); $plugin = new Sabre_DAV_Auth_Plugin(new Sabre_DAV_Auth_MockBackend(), 'realm'); $fakeServer->addPlugin($plugin); $request = new Sabre_HTTP_Request(array('REQUEST_METHOD' => 'REPORT', 'HTTP_CONTENT_TYPE' => 'application/xml', 'REQUEST_URI' => '/')); $request->setBody('<?xml version="1.0"?><s:somereport xmlns:s="http://www.rooftopsolutions.nl/NS/example" />'); $fakeServer->httpRequest = $request; $fakeServer->httpResponse = new Sabre_HTTP_ResponseMock(); $fakeServer->exec(); $this->assertEquals('HTTP/1.1 501 Not Implemented', $fakeServer->httpResponse->status); }
public function frameResponse(\FrameResponseObject $frameResponseObject) { $root = array(new \SteamDavDirectory($GLOBALS["STEAM"]->get_current_steam_user()->get_workroom()), new \Sabre_DAV_SimpleDirectory("Lesezeichen"), new \Sabre_DAV_SimpleDirectory("Gruppen"), new \Sabre_DAV_SimpleDirectory("Kurse")); $server = new \Sabre_DAV_Server($root); $server->setBaseUri("/webdav/index/"); // Support for html frontend $browser = new \Sabre_DAV_Browser_Plugin(); $server->addPlugin($browser); // And off we go! $server->exec(); exit; }
public function gallery() { $root = new Gallery3_DAV_Album(""); $tree = new Gallery3_DAV_Tree($root); // Skip the lock plugin for now, we don't want Finder to get write support for the time being. // $lock_backend = new Sabre_DAV_Locks_Backend_FS(TMPPATH . "sabredav"); // $lock = new Sabre_DAV_Locks_Plugin($lock_backend); $filter = new Sabre_DAV_TemporaryFileFilterPlugin(TMPPATH . "sabredav"); $server = new Sabre_DAV_Server($tree); $server->setBaseUri(url::site("webdav/gallery")); // $server->addPlugin($lock); $server->addPlugin($filter); if ($this->_authenticate()) { $server->exec(); } }
/** * @depends testNoAdminAccess */ function testAdminAccess() { $principalBackend = new Sabre_DAVACL_MockPrincipalBackend(); $tree = array(new Sabre_DAVACL_MockACLNode('adminonly', array()), new Sabre_DAVACL_PrincipalCollection($principalBackend)); $fakeServer = new Sabre_DAV_Server($tree); $plugin = new Sabre_DAV_Auth_Plugin(new Sabre_DAV_Auth_MockBackend(), 'realm'); $fakeServer->addPlugin($plugin); $plugin = new Sabre_DAVACL_Plugin(); $plugin->adminPrincipals = array('principals/admin'); $fakeServer->addPlugin($plugin); $request = new Sabre_HTTP_Request(array('REQUEST_METHOD' => 'OPTIONS', 'HTTP_DEPTH' => 1, 'REQUEST_URI' => '/adminonly')); $response = new Sabre_HTTP_ResponseMock(); $fakeServer->httpRequest = $request; $fakeServer->httpResponse = $response; $fakeServer->exec(); $this->assertEquals('HTTP/1.1 200 OK', $response->status); }
/** * @depends testTreeMove * @depends testCopyMoveInfo */ function testEverything() { // Request object $serverVars = array('REQUEST_METHOD' => 'MOVE', 'REQUEST_URI' => '/webdav/foo', 'HTTP_DESTINATION' => 'http://dev2.tribalos.com/webdav/%C3%A0fo%C3%B3', 'HTTP_OVERWRITE' => 'F'); $request = new Sabre_HTTP_Request($serverVars); $request->setBody(''); $response = new Sabre_HTTP_ResponseMock(); // Server setup mkdir(SABRE_TEMPDIR . '/issue33'); $dir = new Sabre_DAV_FS_Directory(SABRE_TEMPDIR . '/issue33'); $dir->createDirectory('foo'); $tree = new Sabre_DAV_ObjectTree($dir); $server = new Sabre_DAV_Server($tree); $server->setBaseUri('/webdav/'); $server->httpRequest = $request; $server->httpResponse = $response; $server->exec(); $this->assertTrue(file_exists(SABRE_TEMPDIR . '/issue33/' . urldecode('%C3%A0fo%C3%B3'))); }
/** * Handles a WebDAV request. */ public function requestAction() { if (!isset($this->_config->resources->sabredav->enabled) || 0 == $this->_config->resources->sabredav->enabled) { // Render 404 $response = $this->getResponse(); $response->clearAllHeaders(); $response->clearBody(); $response->setHttpResponseCode(404); $response->sendResponse(); return; } $baseUri = $this->view->url('@admin_webdav'); $publicDir = ROOT_PATH . '/public/uploads'; $tmpDir = ROOT_PATH . '/data/tmp'; $auth = new Sabre_HTTP_BasicAuth(); $auth->setRealm('Fizzy'); $authResult = $auth->getUserPass(); if (false === $authResult) { $auth->requireLogin(); die('Authentication required'); } list($username, $password) = $authResult; $authAdapter = new Fizzy_Doctrine_AuthAdapter($username, $password); $authResult = $authAdapter->authenticate(); if ($authResult->getCode() !== Zend_Auth_Result::SUCCESS) { $auth->requireLogin(); die('Authentication failed'); } $publicDirObj = new Sabre_DAV_FS_Directory($publicDir); $objectTree = new Sabre_DAV_ObjectTree($publicDirObj); $server = new Sabre_DAV_Server($objectTree); $server->setBaseUri($baseUri); if (isset($this->_config->resources->sabredav->browser) && false != $this->_config->resources->sabredav->browser) { $browser = new Sabre_DAV_Browser_Plugin(); $server->addPlugin($browser); } $server->exec(); }
function request(Sabre_HTTP_Request $request) { $this->server->httpRequest = $request; $this->server->exec(); return $this->server->httpResponse; }
* License as published by the Free Software Foundation; either * version 3 of the License, or any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU AFFERO GENERAL PUBLIC LICENSE for more details. * * You should have received a copy of the GNU Affero General Public * License along with this library. If not, see <http://www.gnu.org/licenses/>. * */ // only need filesystem apps $RUNTIME_APPTYPES = array('filesystem', 'authentication'); OC_App::loadApps($RUNTIME_APPTYPES); // Backends $authBackend = new OC_Connector_Sabre_Auth(); $lockBackend = new OC_Connector_Sabre_Locks(); // Create ownCloud Dir $publicDir = new OC_Connector_Sabre_Directory(''); // Fire up server $server = new Sabre_DAV_Server($publicDir); $server->setBaseUri($baseuri); // Load plugins $server->addPlugin(new Sabre_DAV_Auth_Plugin($authBackend, 'ownCloud')); $server->addPlugin(new Sabre_DAV_Locks_Plugin($lockBackend)); $server->addPlugin(new Sabre_DAV_Browser_Plugin(false)); // Show something in the Browser, but no upload // And off we go! $server->exec();
function testACLIntegrationNotBlocked() { if (!SABRE_HASSQLITE) { $this->markTestSkipped('SQLite driver is not available'); } $cbackend = Sabre_CalDAV_TestUtil::getBackend(); $pbackend = new Sabre_DAVACL_MockPrincipalBackend(); $props = array('uri' => 'UUID-123467', 'principaluri' => 'admin', 'id' => 1); $tree = array(new Sabre_CalDAV_Calendar($pbackend, $cbackend, $props), new Sabre_DAVACL_PrincipalCollection($pbackend)); $p = new Sabre_CalDAV_ICSExportPlugin(); $s = new Sabre_DAV_Server($tree); $s->addPlugin($p); $s->addPlugin(new Sabre_CalDAV_Plugin()); $s->addPlugin(new Sabre_DAVACL_Plugin()); $s->addPlugin(new Sabre_DAV_Auth_Plugin(new Sabre_DAV_Auth_MockBackend(), 'SabreDAV')); // Forcing login $s->getPlugin('acl')->adminPrincipals = array('principals/admin'); $h = new Sabre_HTTP_Request(array('QUERY_STRING' => 'export', 'REQUEST_URI' => '/UUID-123467', 'REQUEST_METHOD' => 'GET')); $s->httpRequest = $h; $s->httpResponse = new Sabre_HTTP_ResponseMock(); $s->exec(); $this->assertEquals('HTTP/1.1 200 OK', $s->httpResponse->status, 'Invalid status received. Response body: ' . $s->httpResponse->body); $this->assertEquals(array('Content-Type' => 'text/calendar'), $s->httpResponse->headers); $obj = Sabre_VObject_Reader::read($s->httpResponse->body); $this->assertEquals(5, count($obj->children())); $this->assertEquals(1, count($obj->VERSION)); $this->assertEquals(1, count($obj->CALSCALE)); $this->assertEquals(1, count($obj->PRODID)); $this->assertEquals(1, count($obj->VTIMEZONE)); $this->assertEquals(1, count($obj->VEVENT)); }
public function webdavAction() { $homeDir = Asset::getById(1); try { $publicDir = new Asset_WebDAV_Folder($homeDir); $objectTree = new Asset_WebDAV_Tree($publicDir); $server = new Sabre_DAV_Server($objectTree); $server->exec(); } catch (Exception $e) { Logger::error($e); } exit; }
function index() { exit('webdav is not yet finished'); ob_clean(); $this->load->helper('url'); $publicDir = USERFILES . 'media/content'; $tmpDir = CACHEDIR . 'webdav'; $tmpDir = normalize_path($tmpDir); if (is_dir($tmpDir) == false) { mkdir($tmpDir); } $publicDir = normalize_path($publicDir); if (is_dir($publicDir) == false) { mkdir($publicDir); } // If you want to run the SabreDAV server in a custom location (using mod_rewrite for instance) // You can override the baseUri here. require_once BASEPATH . 'libraries/webshare/lib/Sabre.autoload.php'; $u = 'admin'; $p = '1234'; //$auth = new Sabre_HTTP_DigestAuth (); //$auth->init (); $is_valid = false; //$username_test = $auth->getUsername (); //$pass_test = $auth->validatePassword (); //$auth2 = new Sabre_HTTP_BasicAuth (); //$passresult = $auth2->getUserPass (); //p($passresult); /*if (! $username_test) { $is_valid = false; } else { $data = array (); $data ['username'] = $username_test; //$data ['password'] = $pass_test; $data ['is_active'] = 'y'; $data ['is_admin'] = 'y'; $data = CI::model ( 'users' )->getUsers ( $data ); $data = $data [0]; // if (! empty ( $data )) { //p($data); $pass_test = $auth->validatePassword ( $data ['password'] ); //p($pass_test); if ($pass_test == true) { $is_valid = true; } else { $is_valid = false; } } else { $is_valid = false; } //p($data); } if ($is_valid == false) { //$auth->requireLogin (); //echo "Authentication required\n"; //die (); }*/ // Create the root node $root = new Sabre_DAV_FS_Directory($publicDir); //..p($_SERVER); // The rootnode needs in turn to be passed to the server class $server = new Sabre_DAV_Server($root); //$baseUri = '/cms/webdav/'; $temp1 = site_url('webdav'); $temp1 = parse_url($temp1); //p($temp1); $baseUri = $temp1['path']; if (isset($baseUri)) { $server->setBaseUri($baseUri); } // Support for LOCK and UNLOCK $lockBackend = new Sabre_DAV_Locks_Backend_FS($tmpDir); $lockPlugin = new Sabre_DAV_Locks_Plugin($lockBackend); $server->addPlugin($lockPlugin); $server->addPlugin(new Sabre_DAV_Mount_Plugin()); // Support for html frontend $browser = new Sabre_DAV_Browser_Plugin(); $server->addPlugin($browser); // Temporary file filter $tempFF = new Sabre_DAV_TemporaryFileFilterPlugin($tmpDir); $server->addPlugin($tempFF); // And off we go! $server->exec(); dav; }
/** * @brief handle webdav request * * @param bool $body * * @note this init procedure is copied from /apps/files/appinfo/remote.php */ function handleWebdavRequest($body = false) { // Backends $authBackend = new OC_Connector_Sabre_Auth(); $lockBackend = new OC_Connector_Sabre_Locks(); $requestBackend = new OC_Connector_Sabre_Request(); // Create ownCloud Dir $publicDir = new OC_Connector_Sabre_Directory(''); // Fire up server $server = new Sabre_DAV_Server($publicDir); $server->httpRequest = $requestBackend; $server->setBaseUri('/remote.php/webdav/'); // Load plugins $server->addPlugin(new Sabre_DAV_Auth_Plugin($authBackend, 'ownCloud')); $server->addPlugin(new Sabre_DAV_Locks_Plugin($lockBackend)); $server->addPlugin(new Sabre_DAV_Browser_Plugin(false)); // Show something in the Browser, but no upload $server->addPlugin(new OC_Connector_Sabre_QuotaPlugin()); $server->addPlugin(new OC_Connector_Sabre_MaintenancePlugin()); // And off we go! if ($body) { $server->httpRequest->setBody($body); } // turn on output buffering ob_start(); // handle request $server->exec(); // file content is written in the output buffer $content = ob_get_contents(); // flush the output buffer and turn off output buffering ob_end_clean(); // return captured content return $content; }
public function exec() { Logging::logDebug("WebDAV request: " . Util::array2str($this->httpRequest->getHeaders())); parent::exec(); }
function __construct(ipsRegistry $registry) { $this->registry = $registry; $this->DB = $this->registry->DB(); $this->settings =& $this->registry->fetchSettings(); $this->request =& $this->registry->fetchRequest(); $this->cache = $this->registry->cache(); $this->caches =& $this->registry->cache()->fetchCaches(); /* Set require path to include sabre directory */ @set_include_path(IPS_KERNEL_PATH . 'sabre/'); /*noLibHook*/ ipsRegistry::$settings['use_friendly_urls'] = 0; /* Fetch authentication library */ $classToLoad = IPSLib::loadLibrary(IPS_ROOT_PATH . 'sources/handlers/han_login.php', 'han_login'); $login = new $classToLoad($registry); /* Require spl for sabre */ require_once 'Sabre.autoload.php'; /*noLibHook*/ /* Attempt authentication */ $auth = new Sabre_HTTP_BasicAuth(); $auth->setRealm("IP.Board WebDav"); /* Enabled? */ if (!$this->settings['webdav_on']) { $auth->requireLogin(); echo "Please visit your Admin CP - Look and Feel - Externally Edit Templates and CSS to enable this functionality"; exit; } /* Fetch details */ $authDetails = $auth->getUserPass(); /* Check auth */ $member = IPSMember::load(IPSText::parseCleanValue($authDetails[0]), 'all', 'username'); if (!$member['member_id']) { $auth->requireLogin(); print "Authentication Required (User doesn't exist)"; exit; } /* Internal auth only */ $result = IPSMember::authenticateMember($member['member_id'], md5(IPSText::parseCleanValue($authDetails[1]))); if ($result === false) { $auth->requireLogin(); print "Authentication Required (Username or password incorrect)"; exit; } /* Load permissions class */ $classToLoad = IPSLib::loadLibrary(IPS_ROOT_PATH . 'sources/classes/class_permissions.php', 'class_permissions'); $this->registry->setClass('class_permissions', new $classToLoad($this->registry)); if (!$member['g_access_cp']) { $auth->requireLogin(); print "Authentication Required (You are not an admin)"; exit; } if (!$this->registry->getClass('class_permissions')->checkPermission('settemplates_external_edit')) { $auth->requireLogin(); print "You are not permitted to edit skins externally"; exit; } /* Require some files for our sabre implementation */ require_once IPS_ROOT_PATH . 'sources/classes/sabre/root/skins.php'; /*noLibHook*/ require_once IPS_ROOT_PATH . 'sources/classes/sabre/directory/templates.php'; /*noLibHook*/ require_once IPS_ROOT_PATH . 'sources/classes/sabre/directory/groups.php'; /*noLibHook*/ require_once IPS_ROOT_PATH . 'sources/classes/sabre/files/templates.php'; /*noLibHook*/ require_once IPS_ROOT_PATH . 'sources/classes/sabre/lock/nolocks.php'; /*noLibHook*/ $tree = new Sabre_DAV_ObjectTree(new sabre_root_skins()); $server = new Sabre_DAV_Server($tree); $server->setBaseUri($this->getBaseUrl() . '/'); //$server->addPlugin( new Sabre_DAV_Browser_Plugin() ); $server->addPlugin(new Sabre_DAV_Locks_Plugin(new sabre_lock_nolocks())); /* Process */ $server->exec(); }
/** * @param App $a */ function dav_init(&$a) { /* * Recommended settings: * ALTER TABLE `photo` ADD INDEX ( `contact-id` ) */ dav_include_files(); if (false) { dbg(true); error_reporting(E_ALL); ini_set("display_errors", 1); } wdcal_create_std_calendars(); if ($a->argc >= 2 && $a->argv[1] == "wdcal") { if ($a->argc >= 3 && $a->argv[2] == "feed") { wdcal_print_feed($a->get_baseurl() . "/dav/wdcal/"); killme(); } elseif ($a->argc >= 3 && strlen($a->argv[2]) > 0) { wdcal_addRequiredHeadersEdit(); } else { wdcal_addRequiredHeaders(); } return; } if ($a->argc >= 2 && $a->argv[1] == "settings") { return; } $authBackend = new Sabre_DAV_Auth_Backend_Friendica(); $principalBackend = new Sabre_DAVACL_PrincipalBackend_Friendica($authBackend); $caldavBackend_std = new Sabre_CalDAV_Backend_Std(); $caldavBackend_community = new Sabre_CalDAV_Backend_Friendica(); $carddavBackend_std = new Sabre_CardDAV_Backend_Std(); $carddavBackend_community = new Sabre_CardDAV_Backend_FriendicaCommunity(); if (isset($_SERVER["PHP_AUTH_USER"])) { $tree = new Sabre_DAV_SimpleCollection('root', array(new Sabre_DAV_SimpleCollection('principals', array(new Sabre_CalDAV_Principal_Collection($principalBackend, "principals/users"))), new Sabre_CalDAV_AnimexxCalendarRootNode($principalBackend, array($caldavBackend_std, $caldavBackend_community)), new Sabre_CardDAV_AddressBookRootFriendica($principalBackend, array($carddavBackend_std, $carddavBackend_community)))); } else { $tree = new Sabre_DAV_SimpleCollection('root', array()); } // The object tree needs in turn to be passed to the server class $server = new Sabre_DAV_Server($tree); $url = parse_url($a->get_baseurl()); $server->setBaseUri(CALDAV_URL_PREFIX); $authPlugin = new Sabre_DAV_Auth_Plugin($authBackend, 'SabreDAV'); $server->addPlugin($authPlugin); $aclPlugin = new Sabre_DAVACL_Plugin_Friendica(); $aclPlugin->defaultUsernamePath = "principals/users"; $server->addPlugin($aclPlugin); $caldavPlugin = new Sabre_CalDAV_Plugin(); $server->addPlugin($caldavPlugin); $carddavPlugin = new Sabre_CardDAV_Plugin(); $server->addPlugin($carddavPlugin); $browser = new Sabre_DAV_Browser_Plugin(); $server->addPlugin($browser); $server->exec(); killme(); }
if (!$auth->validateA1($userAuth["a1hash"])) { Logging::logDebug("DAV digest authentication failure"); $auth->requireLogin(); echo "Authentication required\n"; die; } $env->authentication()->setAuth($user, "pw"); } $dav = new Sabre_DAV_Server(new Mollify_DAV_Root($env->filesystem())); $dav->setBaseUri($BASE_URI); if ($ENABLE_LOCKING) { $dav->addPlugin(new Sabre_DAV_Locks_Plugin(new Sabre_DAV_Locks_Backend_FS('data'))); } if ($ENABLE_BROWSER) { $dav->addPlugin(new Sabre_DAV_Browser_Plugin()); } if ($ENABLE_TEMPORARY_FILE_FILTER) { $dav->addPlugin(new Sabre_DAV_TemporaryFileFilterPlugin('temp')); } $dav->addPlugin(new Sabre_DAV_Mount_Plugin()); $dav->exec(); } catch (Exception $e) { Logging::logException($e); throw new Sabre_DAV_Exception_BadRequest(); } function getDB($settings) { require_once "db/DBConnectionFactory.class.php"; $f = new DBConnectionFactory(); return $f->createConnection($settings); }